Tips
Tips
-
What to know about VPN termination
Network teams make several decisions when designing a secure VPN. One of those is where in the network, logically, they will terminate the VPN tunnels. Continue Reading
-
Network traffic pattern shifts reflect COVID-19 changes
The novel coronavirus pandemic spurred initial changes in network traffic patterns, but other trends are playing important roles in perpetuating permanent traffic shifts. Continue Reading
-
How to build a network monitoring business case
As network teams construct a business case for a new network monitoring tool, they should include a cost comparison of alternative tools and a strong defense for the selected tool. Continue Reading
-
Network engineer career advice amid the COVID-19 pandemic
As COVID-19 dramatically affects the global economy, people may ask, 'What's next for my career?' No one is sure, but these tips can help network engineers feel and stay secure. Continue Reading
-
Pair programming pros and cons for network automation
Pair programming is an Agile software development technique that reduces bugs and produces better software. Can pair programming work between networking experts and programmers? Continue Reading
-
Remote access best practices emphasize security, ease of use
COVID-19 has forced companies to determine the best way to keep remote employees supported. Not sure which way to proceed? Consider these remote access best practices. Continue Reading
-
The pros and cons of SD-WAN and remote access
SD-WAN could be a compelling option for enterprises that require remote access for mission-critical jobs. But IT teams should be aware of cost, training and implementation barriers. Continue Reading
-
Remote work infrastructure requires on-prem network changes
Demilitarized zone, network access control and VPN termination points are some of the on-premises components that need to be addressed in a remote work infrastructure. Continue Reading
-
5 needed product features to fix network management issues
Virtualization and public cloud monitoring are among five top network management issues facing companies as they assess tools designed to oversee increasingly complex networks. Continue Reading
-
How ISPs and operators ensure network quality in a pandemic
COVID-19 has caused a spike in remote workers, increased internet usage and traffic surges. Here's how ISPs and telecom operators plan for continuity and quality during the pandemic. Continue Reading
-
Tips to improve network visibility and security
Network visibility and security can be tricky, especially with the range of products available. These tips help teams pinpoint potential vulnerabilities and gauge the tools they need. Continue Reading
-
Why configuration management is important for networks
Configuration management is essential to keep accurate network configuration records and to help organizations avoid potential challenges or problems within their networks. Continue Reading
-
Evolution of cellular 5G backhaul architecture faces challenges
Backhaul has become trendy again and for good reason. 5G backhaul architecture means network architects will have to reconsider how their networks can handle 1 Gbps speeds. Continue Reading
-
How Wi-Fi experts can help during times of crisis management
When faced with disaster response, wireless network professionals can volunteer their Wi-Fi skills and advise friends and family about home network security. Continue Reading
-
How SASE architecture integrates with network infrastructure
SASE architecture offers a compelling value proposition, as it converges networking and security services onto a single cloud platform. Explore how it works with existing infrastructure. Continue Reading
-
Software-based routing on its way to become the new normal
SD-WAN took the networking world by storm, and software-based routing aims to do the same in the router market. Here's what to expect from the move to software. Continue Reading
-
Why SASE adoption requires a paradigm shift
Enterprises preparing to adopt Secure Access Service Edge should understand how the architecture presents organizational and architectural challenges for network and security teams. Continue Reading
-
How to manage the surge in remote video internet traffic
As more people work from home and create more internet traffic, enterprise network managers should adjust bandwidth levels and consider connectivity upgrades. Continue Reading
-
802.3cg standard extends single-pair Ethernet range and speed
IEEE 802.3cg is a single-pair Ethernet standard that aims to support speeds up to 10 Mbps, extend Ethernet range up to 1,000 meters and offer multidrop capabilities. Continue Reading
-
How supporting a remote workforce stresses the network
Make sure your network can support a remote workforce by analyzing 12 potential issues that can cause stress on your network, including VPN concentrator capacity and traffic routing. Continue Reading
-
Before deploying SD-WAN, assess your underlay network components
If enterprises are to reap the benefits of SD-WAN, they better pay attention to the SD-WAN underlay network. Learn what you should take into consideration. Continue Reading
-
How to handle vendor code bugs in enterprise Wi-Fi networking
Too many features in Wi-Fi devices can breed some serious code bugs. One coping mechanism is to seek help from fellow customers and network integrators. Continue Reading
-
The convergence of networking and security at the edge
Networking and security are converging with offerings like SD-WAN and SD-branch. But enterprises and vendors must overcome IT silos that delay innovation and decision-making. Continue Reading
-
Plan a VPN and remote access strategy for pandemic, disaster
Disasters and pandemics occur unexpectedly, affecting companies, workers and networks alike. Plan a remote access strategy that covers VPN requirements, bandwidth demands and licenses. Continue Reading
-
Ansible limitations for network automation
Ansible can be a powerful tool for network automation, but users should be aware of its limitations with debugging, performance, complex data structures and control flow. Continue Reading
-
What do 2G and 3G sunset dates mean for business customers?
A 2G and 3G shutdown probably won't affect businesses much, but embedded IoT devices may see some problems as these two older cellular technologies fade away. Continue Reading
-
An introduction to network automation with Ansible
Ansible is one of the most popular open source network automation tools. Network pros can use it to perform basic network automation tasks, like collecting ARP table data. Continue Reading
-
Watch for these 6 wireless networking trends in 2020
No doubt you've heard about 5G and Wi-Fi 6. But don't forget other wireless trends emerging in 2020, such as CBRS, dynamic spectrum sharing and Open RAN. Continue Reading
-
When assessing SD-WAN benefits, don't ignore SD-WAN costs
SD-WAN offers several benefits, but companies also need to understand SD-WAN costs. Organizations need to consider some critical areas -- and not all of them are obvious. Continue Reading
-
SD-WAN requirements for a multi-cloud world
With the emergence of a multi-cloud world, SD-WAN vendors must upgrade their platforms to ensure secure and reliable SD-WAN connectivity to cloud services. Continue Reading
-
Understand business value to advance your networking career
Network pros can use the CAR mindset -- challenge, action and result -- to better match their networking initiatives with business goals and advance their career opportunities. Continue Reading
-
What to include in a network services agreement
Network teams that create MSP contracts for their managed network services should cover delivery lead times, network performance, adds and changes, network uptime and escalation. Continue Reading
-
How SD-WAN changes the network security perimeter
The advent of SD-WAN has changed the network security model by pushing more security and control to the edge -- and businesses need to adjust to this new reality. Continue Reading
-
3 ways to improve WAN performance with SD-WAN
SD-WAN can improve WAN performance in three ways: It adds a secondary transport for network traffic, while also taking advantage of broadband Ethernet and application acceleration. Continue Reading
-
Network device discovery best practices -- other than ping sweeps
Traditionally, ping sweeps are the go-to method for network device discovery. But, by creating a network script, you can discover networked devices more efficiently. Continue Reading
-
When to consider managed SD-WAN services for your business
SD-WAN offers promising benefits, like the ability to use multiple ISP links, but managing those links can prove challenging. Managed SD-WAN services can help. Continue Reading
-
Compare Paramiko, Netmiko and NAPALM network automation
Python is a useful language, but it can't do everything. Explore some basic network automation scripts that use Python with three automation libraries: Paramiko, Netmiko and NAPALM. Continue Reading
-
Plan for simplicity when approaching HCI networking
HCI networking isn't as easy as plugging cables in and hoping the HCI system works. IT teams need to strategize around capacity and resiliency to achieve true simplification. Continue Reading
-
7 key SD-branch trends to expect in 2020
New year, new developments. See what's new with SD-branch in 2020, including security advancements and how technologies such as Wi-Fi 6 and 5G will affect branch offices. Continue Reading
-
SD-WAN drives managed network services trends for 2020
As network operators offer more SD-WAN managed services in 2020, the managed services market will see some major changes regarding price, feature sets and management. Continue Reading
-
How to benchmark 25 GbE NICs in converged networks
Network teams can use an array of tools to benchmark the performance and efficiency of 25 GbE network adapters that support converged networks and HCI environments. Continue Reading
-
The top network security trends, threats and strategies in 2020
Ransomware and attacks against cloud providers reflect key network security trends in 2020. To combat these threats preemptively, assess your specific network needs. Continue Reading
-
Assess the Wi-Fi 6 features available in Wave 1 and Wave 2
Catch up on the different features available with the first wave of Wi-Fi 6, including OFDMA and Target Wake Time, and find out which capabilities Wave 2 will bring. Continue Reading
-
Network security design best practices and principles: Keep it simple
Comprehensive network security design means understanding the components that constitute your network and how and when everything is managed. Continue Reading
-
What SD-WAN devices do I need in an SD-WAN deployment?
Despite the software-centric nature of software-defined WAN, certain SD-WAN devices are still required to help transport traffic and complete network connections. Continue Reading
-
Why Secure Access Service Edge is the future of SD-WAN
Secure Access Service Edge -- or SASE -- architecture transitions from network designs that revolve around the data center to a model based on identity and user context. Continue Reading
-
The top 10 network security best practices to implement today
Even as security techniques improve, attackers are becoming more adept. Learn about 10 network security best practices and how they can keep your network secure. Continue Reading
-
Benefits of network automation software ease challenges for IT
Network automation software comes with a compelling list of benefits, but IT teams should confirm which processes are automated and how the software integrates with existing tools. Continue Reading
-
After a data breach occurs, follow this network security checklist
Before a network breach occurs, you should already have a response plan in place. To make sure you're taking a proactive approach, follow this network security checklist. Continue Reading
-
Build an effective SD-WAN security strategy at the branch
Don't deploy SD-WAN without a solid network security strategy. IT teams should address four specific areas to ensure adequate security and protection against network threats. Continue Reading
-
Increase security visibility with network automation tasks
IT teams can set up automation tasks that generate security reports about network traffic data. These read-only dashboards are useful for executives that ask for system updates. Continue Reading
-
Edge computing use cases and drivers to watch
Edge computing use cases span across multiple industry sectors, including manufacturing, retail and medical. The motives for adoption filter down to three main drivers. Continue Reading
-
SD-WAN deployment in the works? Consider these 3 things
SD-WAN can simplify the deployment and management of new branch WANs, but there are some key configuration and technical choices you must make to get started. Continue Reading
-
5 steps to follow in a network security audit checklist
Planning, execution, analysis, reporting and follow-up are the basic elements of a network security audit checklist. But coordination among IT teams is also important. Continue Reading
-
Top 3 network security threats and how to protect against them
Enterprise networks are seemingly always under attack. Learn about the most common network security threats and what protections you should have in place. Continue Reading
-
How to develop and implement a network security plan
When formulating a focused network security plan, you'll need to address specific questions about outbound traffic, user logins and government regulations. Continue Reading
-
Data center transformation drives the ADC security use case
Application delivery controllers play many roles, but the ADC security use case might be most important. Learn about ADC features and how they boost data center security. Continue Reading
-
Automation improves firewall migration and network security
Firewall migration is a compelling automation use case, as automation scripts can shorten the migration process, eliminate unused rules and bolster overall network security. Continue Reading
-
5G, edge computing and IoT poised to retool networking
The combination of 5G and edge computing could introduce several changes for network operations. Find out why the network infrastructure -- along with fog computing -- is so important. Continue Reading
-
5G frequency spectrum forces new look at coverage strategies
New 5G frequency allocations will help make it an amazing technology, but it will also force a rethinking of how those signals are transmitted. Continue Reading
-
How network standards and open source organizations differ
Both open source and network standards organizations want to develop the next-generation network. Yet their methods differ, and they can benefit different types of organizations. Continue Reading
-
Understanding why IPv6 renumbering problems occur
IPv6 renumbering can be a challenge, especially if a host using SLAAC obtains stale prefixes. But there are steps you can take to reduce your vulnerability. Continue Reading
-
5G vs. LTE: Comparing speed, spectrum and latency
The debate between 5G and LTE largely comes down to speed and spectrum. But latency and wired network implications are also important differentiators. Continue Reading
-
The benefits of Wi-Fi 6 and how to prepare for them
In order to glean the benefits of Wi-Fi 6, enterprises first need to determine the best steps for a migration strategy. Two key steps are implementing more power and faster uplinks. Continue Reading
-
How client VPN technologies will evolve with AI and automation
With help from artificial intelligence and automation, client VPN technologies could innovate the way they handle data flows within hybrid cloud environments. Continue Reading
-
How SD-WAN security can boost your network security strategy
Many organizations say security is a top priority for their business, but most lack the necessary resources to thoroughly secure their networks and cloud services. SD-WAN could help. Continue Reading
-
Data center performance requirements spur 25 GbE upgrades
Enterprises are upgrading their data centers with 25 GbE to achieve better throughput and support I/O-intensive applications. Here are some best practices for making the switch. Continue Reading
-
Achieve network perimeter security through deep segmentation
Firewall effectiveness is in deep decline, but there's still a way to create an effective security perimeter through the practice of deep segmentation. Learn how. Continue Reading
-
What to expect with SD-WAN management, intent and usability
Users can expect advancements in SD-WAN intent, usability and management, as vendors seek to improve their developer ecosystems, integration and multi-tenancy capabilities. Continue Reading
-
6 steps to a successful network disaster recovery plan
Don't wait until disaster strikes to consider network resiliency and recovery. Use these six practical steps to build a network disaster recovery plan that fits your business needs. Continue Reading
-
Learn about the top telecom certifications
Use this expert advice to wade through myriad telecom certifications and pinpoint the top certifications for the industry, like TCO, iNARTE and BICSI certifications. Continue Reading
-
Why streaming telemetry tops SNMP in tracking network performance
SNMP isn't going away anytime soon, but streaming telemetry is a much more effective way to generate critical alerts and measure network performance. Continue Reading
-
3 real-world network automation use cases
The real benefits of network automation are managing multiple network devices at once. Larger networks, in particular, can benefit from these network automation use cases. Continue Reading
-
Edge computing and IoT combine to reshape the network
Enterprises are examining edge computing and IoT in a new light to determine the best way to process and transmit the mountain of data generated by IoT devices. Continue Reading
-
5G and SD-WAN could provide reliable, alternate connectivity
5G and SD-WAN could develop into an alternative connectivity option that offers high speeds and low latency to geographic areas and remote workers with limited connectivity options. Continue Reading
-
The role of edge computing security in enterprise networks
By ensuring IoT security, IT teams can secure enterprise networks as well. Edge computing can provide one path toward this security, as long as IT properly evaluates and plans for it. Continue Reading
-
How 5G deployment will affect enterprise network hardware, software
Enterprise network architects can start thinking about 5G deployment now, focusing on mobile usage, real-time communications and 5G-capable network equipment. Continue Reading
-
4 criteria to consider in your cloud migration strategy
Organizations that are evaluating a workload migration to the cloud should use this workload placement process to build a consistent cloud migration strategy. Continue Reading
-
The status of white box networking in the enterprise
Despite the benefits of white box networking, most enterprises are cautious about deployment. Use these five questions to determine when white box implementation is a smart move. Continue Reading
-
The benefits of open source networking for enterprise IT
The benefits of open source are proved among large providers. But enterprises are less inclined to use open source networking, due to its limited functionality and support. Continue Reading
-
Wi-Fi 6 and IoT could threaten the network
New advances in Wi-Fi technology -- like Wi-Fi 6 -- and IoT can create bottlenecks in legacy campus LANs due to increased throughput consumption and slower uplink speeds. Continue Reading
-
Weighing the pros and cons of enterprise network subscriptions
A centralized repository of network licenses can help enterprises visualize their IT assets and manage their purchases. But higher costs and amortization issues lurk. Continue Reading
-
Wireless capacity more important than fast Wi-Fi 6 speed
Wi-Fi 6 speed may be getting all the attention, but the most compelling advantages of the new standard are techniques engineered to increase wireless capacity. Continue Reading
-
Drawbacks of open source networking could impede full growth
IT teams have increasingly accepted the use of open source within their organizations. But open source networking continues to lag behind -- and it may not catch up. Continue Reading
-
Wi-Fi 6 vs. 5G networks is more about cooperation than competition
While Wi-Fi 6 and 5G might experience some interference with each other, enterprises should focus on the handoff of connections between the two technologies. Continue Reading
-
3 critical considerations for your network management strategy
The debate continues between the use of a single network management tool or a variety. Three considerations can help point your network management strategy in the right direction. Continue Reading
-
The future of VPN will reflect the need for flexibility
The future of VPN services reflects the industry's trend toward software networking, evident in developments like SD-WAN and public cloud. The need for flexible technology is a main driver. Continue Reading
-
Should you buy 802.11ax devices before the Wi-Fi standard is ratified?
The Wi-Fi 6 standard has not been ratified yet, but enterprises are faced with a decision. Should they buy 802.11ax devices now or wait for the standard to be approved? Continue Reading
-
What happens when edge computing hits enterprise networks?
Is it time to take your network to the edge? Learn what edge networking can do to improve traffic flows, ease demand for high-performing connectivity and more. Continue Reading
-
What the future of edge computing means for cloud and networks
IoT and application processing needs are shaping the future of edge computing, driving the growth of micro modular data centers and raising the question of cloud computing's relevance. Continue Reading
-
Public cloud networking basics: How to navigate to AWS, Azure
Moving workloads to AWS and Azure doesn't have to be difficult as long as you follow a few cloud networking basics. What do you need to know to make the shift? Continue Reading
-
Examine the requirements for 5G core networks
The 5G core network will support millions of devices that need high-speed communication and data processing. Learn what other capabilities are required for 5G deployment. Continue Reading
-
The 3 pillars of SD-WAN QoS and questions to ask your providers
Traffic shaping, path control and forward error correction are three core components of SD-WAN QoS. Here are some crucial questions to ask your vendors regarding those areas. Continue Reading
-
3 steps for a successful data center consolidation plan
A data center consolidation plan is usually riddled with questions. But careful forethought is key for the successful centralization of software and servers. Continue Reading
-
Understand limitations when monitoring cloud performance
When monitoring cloud performance, organizations need to recognize the limitations that come with SaaS, PaaS and IaaS models, as well as public and private cloud architectures. Continue Reading
-
How 5G can start a brand new era for the virtual RAN
5G is forging the way for operators to delve into virtualized RANs. Yet, despite its benefits, vRAN lacks standards and is still in the early developmental stages. Continue Reading
-
3 types of configuration tools for network change management
From openly available scripting tools to vendor-supplied services, network change management and configuration tools generally fit into three main categories. Continue Reading
-
How to monitor CPU usage in SDN environments
Monitoring CPU usage in a software-defined network is necessary to determine adequate network capacity and compute capacity, especially if workloads are competing for resources. Continue Reading
-
What is service chaining and where does VNF onboarding fit in?
Service chaining and VNF onboarding aren't easy. Companies interested in these processes need to understand the challenges involved, as well as various requirements for onboarding. Continue Reading
-
How to strategize for WAN and SD-WAN performance monitoring
The importance of WAN performance monitoring hasn't decreased with the introduction of SD-WAN and other technologies. Enterprises still need to enforce proper monitoring strategies. Continue Reading